Search This Blog

Thursday, June 16, 2011

Don't dismiss community college grads with degrees in information assurance

Tutorial: Cisco Routers Add Web Security with Cisco ScanSafe | NASA, DARPA looking for your input for futuristic space exploration dialogue

Network World Security Strategies

Forward this to a Friend >>>


Don't dismiss community college grads with degrees in information assurance
The CAE2Y program was established to meet the needs of cybersecurity professionals – not all of whom have baccalaureates and advanced degrees. Zdravkovich emphasized that our society needs all dimensions of diversity in the cybersecurity field. Read More


WHITE PAPER: Raritan

Data Center Transformations
Build outs, consolidations and acquisitions are large-scale projects that can be very disruptive and require careful planning and implementation to maintain operations. This white paper examines the process and what's required to meet IT goals and objectives and maintain business continuity. Read now!

WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

Tutorial: Cisco Routers Add Web Security with Cisco ScanSafe
Cisco launched this feature to the market last month at Interop. In a nutshell, this IOS feature provides intelligent, identity aware, traffic redirection to the Cisco ScanSafe web security cloud offering. ScanSafe provides the following web security features as a cloud service: URL Filtering Scanlets analyze all elements of a web request including HTML, JavaScript, Flash and even obfuscated... Read More

NASA, DARPA looking for your input for futuristic space exploration dialogue
DARPA and NASA Ames Research Center today said they are soliciting abstracts, papers, topics and members for discussion panels, to be part of the 100 Year Starship Study Symposium to be held in Orlando, Fla.,  from September 30 through October 2, 2011. Read More

U.S. questioned China about Change.org attack
The U.S. State Department questioned the Chinese government about a cyberattack that had temporarily shutdown Change.org after the site held a petition urging Chinese authorities to release artist Ai Weiwei from custody. Read More

Smartphones and tablets create huge corporate security challenge
Adapting security and management for the new generation of mobile devices -- everything from the Apple iPhone and iPad to Google Android devices to name a few -- is turning out to be a huge corporate challenge. Read More


WHITE PAPER: F5 Networks

Providing Security and Acceleration for Remote Users
Delivering applications to remote users is a significant undertaking. Applications need to be available, and they must be delivered securely and quickly. Through a range of products, F5 has solved the security plus acceleration challenge for remote users with BIG-IP Edge Gateway and BIG-IP APM. Read More!

Bill proposed to regulate collection, use of GPA tracking data
Two lawmakers today proposed a bipartisan bill that would regulate how law enforcement agencies and companies can access and use geo-location data gathered from cell phones, tablets and other mobile devices. Read More

Can virtual machine and cloud systems secure PCI payment card data?
Can sensitive payment card data be processed and held in virtual-machine (VM) systems or cloud-computing environments? Read More

Energy Dept. spends $2B to double US concentrated solar power capacity
The US Department of Energy today said it was conditionally committing $2 billion to develop two concentrating solar power projects that it says will offer 500 megawatts of power combined, effectively doubling the nation's currently installed capacity of that type of power. Read More

Spear phishers sharpen skills, craft 'incredible' attacks, say experts
Recent break-ins at high-profile targets like the International Monetary Fund (IMF) demonstrate just how proficient hackers have become at 'spear phishing,' researchers said today. Read More


WHITE PAPER: F5 Networks

Manageable Application Security
Investments in security solutions have to provide a clear value, which equals additional time spent collecting and documenting proof of this value. The latest version of F5 BIG-IP Application Security Manager(tm) (ASM), v10.1, addresses information overload and the need for agility in implementation. Learn more!

Get your money for nothing, get your certs for free
A new SSL certificate authority squeezes so much overhead out of supplying certs that it plans to give them away starting next month and to continue at least through the end of the year. Read More

10 iPhone passcodes to pass on
Attention iPhone users: You're not fooling anyone if you're using 1234, 0000, 2580, 1111, 5555, 5683, 0852, 2222, 1212, 1998 as your smartphone passcode. Read More

Regaining perspective on security problems
With all the bad security news that has come out over the last few months, you might think the sky is falling. Once a story catches people's attention, we start seeing it everywhere, kind of like noticing a lot of blue cars after you just bought a blue car. The problem with all this is that it distorts the conversation and we may fail to notice the really important security lessons that can be learned: Read More

Windows XP, Vista AutoRun update reduces malware infections by 82%
Microsoft today credited a February security update for lowering AutoRun-abusing malware infection rates on Windows XP and Vista by as much as 82% since the start of the year. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

10 SaaS companies to watch
These days, companies are applying the software-as-a-service (SaaS) model to just about everything, from core business functions, including IT, to industry-specific processes. This list, compiled with the help of SaaS trend watchers and users, provides a representative look at what types of software you'll find offered in the cloud.

MOST-READ STORIES

  1. What happens if you catch a hacker and must deal with the FBI?
  2. Chrome nearly replaced Firefox in Ubuntu Linux
  3. The 6 hottest new jobs in IT
  4. Ubuntu breaks from the Linux pack
  5. Smartphones and tablets create huge corporate security challenge
  6. Apple surrenders to Nokia in patent fight, others may follow
  7. Five things we love and five things we hate about Ubuntu 11.04
  8. 10 iPhone passcodes to pass on
  9. Toshiba launches new IP phone system
  10. Data center startups emerging to solve virtualization, cloud problems

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: